User Impersonation Affecting org.apache.seatunnel:seatunnel-app package, versions [,1.0.1)
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESEATUNNEL-7573313
- published 30 Jul 2024
- disclosed 30 Jul 2024
- credit Joyh
Introduced: 30 Jul 2024
CVE-2023-48396 Open this link in a new tabHow to fix?
Upgrade org.apache.seatunnel:seatunnel-app
to version 1.0.1 or higher.
Overview
Affected versions of this package are vulnerable to User Impersonation due to the hardcoded jwt key in the application configuration file located at resources/application.yml
file. An attacker can forge any token to impersonate any user by obtaining the secret key and creating a token.